IOC Report
G4jZEW68K1.exe

loading gif

Files

File Path
Type
Category
Malicious
G4jZEW68K1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:54 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\G4jZEW68K1.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp1F99.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp1FAA.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\G4jZEW68K1.exe
"C:\Users\user\Desktop\G4jZEW68K1.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.113.70.99
unknown
India
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
2877000
trusted library allocation
page read and write
malicious
482000
unkown
page readonly
malicious
7680000
trusted library allocation
page read and write
3984000
trusted library allocation
page read and write
C5E000
stack
page read and write
3A51000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
389F000
trusted library allocation
page read and write
5981000
heap
page read and write
6571000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
387E000
trusted library allocation
page read and write
743B000
heap
page read and write
4DD0000
heap
page execute and read and write
3825000
trusted library allocation
page read and write
658E000
trusted library allocation
page read and write
7790000
trusted library allocation
page execute and read and write
3A3A000
trusted library allocation
page read and write
C94000
trusted library allocation
page read and write
7649000
trusted library allocation
page read and write
63B2000
heap
page read and write
3A2F000
trusted library allocation
page read and write
2CAE000
trusted library allocation
page read and write
39C1000
trusted library allocation
page read and write
63CF000
heap
page read and write
4DF0000
trusted library allocation
page read and write
9EE000
heap
page read and write
73DA000
heap
page read and write
380F000
trusted library allocation
page read and write
534E000
stack
page read and write
3909000
trusted library allocation
page read and write
388F000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
5F6E000
stack
page read and write
65BE000
trusted library allocation
page read and write
5E0000
heap
page read and write
3902000
trusted library allocation
page read and write
639E000
heap
page read and write
7690000
trusted library allocation
page read and write
38A6000
trusted library allocation
page read and write
5D0000
heap
page read and write
7652000
trusted library allocation
page read and write
C9D000
trusted library allocation
page execute and read and write
6591000
trusted library allocation
page read and write
4B2000
unkown
page readonly
29B2000
trusted library allocation
page read and write
3BF2000
trusted library allocation
page read and write
ABD000
heap
page read and write
56A000
stack
page read and write
63DD000
heap
page read and write
4C6000
unkown
page readonly
767F000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
4CE5000
trusted library allocation
page read and write
C1E000
stack
page read and write
7362000
heap
page read and write
A25000
heap
page read and write
6539000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
2CBE000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
FC6000
heap
page read and write
390E000
trusted library allocation
page read and write
6528000
trusted library allocation
page read and write
A22000
heap
page read and write
7320000
trusted library allocation
page read and write
5997000
heap
page read and write
382B000
trusted library allocation
page read and write
CC7000
heap
page read and write
490C000
stack
page read and write
2CA6000
trusted library allocation
page read and write
3A0B000
trusted library allocation
page read and write
66C0000
trusted library allocation
page execute and read and write
394C000
trusted library allocation
page read and write
4E00000
heap
page read and write
7427000
heap
page read and write
2993000
trusted library allocation
page read and write
3B93000
trusted library allocation
page read and write
39BE000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
CC0000
heap
page read and write
4CE0000
trusted library allocation
page read and write
77DE000
stack
page read and write
65A0000
trusted library allocation
page read and write
689C000
stack
page read and write
3853000
trusted library allocation
page read and write
73DF000
heap
page read and write
4CA6000
trusted library allocation
page read and write
3A4A000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
73AA000
heap
page read and write
656B000
trusted library allocation
page read and write
3928000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
391F000
trusted library allocation
page read and write
4B7000
unkown
page readonly
3BB9000
trusted library allocation
page read and write
4EEE000
stack
page read and write
4CC0000
trusted library allocation
page read and write
261E000
stack
page read and write
C80000
trusted library allocation
page read and write
7340000
heap
page read and write
2979000
trusted library allocation
page read and write
740F000
heap
page read and write
73C7000
heap
page read and write
3867000
trusted library allocation
page read and write
6600000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
CBA000
trusted library allocation
page execute and read and write
7659000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
4C9E000
trusted library allocation
page read and write
7655000
trusted library allocation
page read and write
4D70000
trusted library allocation
page execute and read and write
7398000
heap
page read and write
DCF000
stack
page read and write
3913000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
8F7000
stack
page read and write
AAB000
heap
page read and write
3A66000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
7540000
heap
page read and write
4D1E000
trusted library allocation
page read and write
3C1C000
trusted library allocation
page read and write
3846000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
5F5000
heap
page read and write
4CDE000
trusted library allocation
page read and write
397F000
trusted library allocation
page read and write
3BDC000
trusted library allocation
page read and write
37F2000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
F90000
trusted library allocation
page execute and read and write
6810000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
7675000
trusted library allocation
page read and write
777F000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
3A1D000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
38D6000
trusted library allocation
page read and write
606F000
stack
page read and write
2986000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
699C000
stack
page read and write
73BD000
heap
page read and write
6640000
trusted library allocation
page read and write
37D1000
trusted library allocation
page read and write
735E000
heap
page read and write
3816000
trusted library allocation
page read and write
772E000
stack
page read and write
3899000
trusted library allocation
page read and write
AD7000
heap
page read and write
6535000
trusted library allocation
page read and write
76D0000
trusted library allocation
page execute and read and write
4D50000
heap
page read and write
2728000
trusted library allocation
page read and write
7688000
trusted library allocation
page read and write
3BC0000
trusted library allocation
page read and write
735B000
heap
page read and write
6560000
trusted library allocation
page read and write
4F90000
heap
page read and write
C90000
trusted library allocation
page read and write
52CE000
stack
page read and write
63AF000
heap
page read and write
518F000
stack
page read and write
3A60000
trusted library allocation
page read and write
71EB000
stack
page read and write
399E000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
6AE3000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
73FE000
heap
page read and write
38CA000
trusted library allocation
page read and write
7330000
heap
page read and write
3C12000
trusted library allocation
page read and write
530E000
stack
page read and write
2957000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
65BB000
trusted library allocation
page read and write
FA0000
heap
page execute and read and write
3C05000
trusted library allocation
page read and write
3A44000
trusted library allocation
page read and write
3A12000
trusted library allocation
page read and write
7550000
heap
page read and write
4DE0000
trusted library allocation
page read and write
27C0000
heap
page read and write
480000
unkown
page readonly
3B7C000
trusted library allocation
page read and write
63C9000
heap
page read and write
39BB000
trusted library allocation
page read and write
72ED000
stack
page read and write
3B9F000
trusted library allocation
page read and write
66B0000
trusted library allocation
page execute and read and write
69DE000
stack
page read and write
7650000
trusted library allocation
page read and write
766A000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
3BD2000
trusted library allocation
page read and write
8450000
heap
page read and write
3C17000
trusted library allocation
page read and write
4E03000
heap
page read and write
F62000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
6525000
trusted library allocation
page read and write
39AB000
trusted library allocation
page read and write
299A000
trusted library allocation
page read and write
38B5000
trusted library allocation
page read and write
39E5000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
3BFF000
trusted library allocation
page read and write
7DAE000
stack
page read and write
7324000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
3C0E000
trusted library allocation
page read and write
38F0000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
2CC1000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
3940000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
7440000
heap
page read and write
3A69000
trusted library allocation
page read and write
296C000
trusted library allocation
page read and write
3A5B000
trusted library allocation
page read and write
AD3000
heap
page read and write
6650000
trusted library allocation
page execute and read and write
FCE000
heap
page read and write
F67000
trusted library allocation
page execute and read and write
7EFD0000
trusted library allocation
page execute and read and write
A15000
heap
page read and write
381C000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
3A64000
trusted library allocation
page read and write
39FE000
trusted library allocation
page read and write
766F000
trusted library allocation
page read and write
3C09000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
65B5000
trusted library allocation
page read and write
7352000
heap
page read and write
29CD000
trusted library allocation
page read and write
3A24000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
651E000
stack
page read and write
5993000
heap
page read and write
5F2F000
stack
page read and write
39CE000
trusted library allocation
page read and write
A00000
heap
page read and write
6379000
heap
page read and write
638A000
heap
page read and write
7CAE000
stack
page read and write
CAD000
trusted library allocation
page execute and read and write
3BE8000
trusted library allocation
page read and write
7403000
heap
page read and write
7BEE000
stack
page read and write
7780000
heap
page read and write
4D62000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
3A2A000
trusted library allocation
page read and write
4CA1000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
3820000
trusted library allocation
page read and write
F6B000
trusted library allocation
page execute and read and write
4DE8000
trusted library allocation
page read and write
73E8000
heap
page read and write
62AE000
stack
page read and write
6537000
trusted library allocation
page read and write
9E0000
heap
page read and write
538E000
stack
page read and write
767A000
trusted library allocation
page read and write
62E9000
heap
page read and write
4C70000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
4CB2000
trusted library allocation
page read and write
2CD7000
trusted library allocation
page read and write
848B000
heap
page read and write
6B20000
trusted library allocation
page execute and read and write
3C14000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
781E000
stack
page read and write
38F7000
trusted library allocation
page read and write
641E000
stack
page read and write
C93000
trusted library allocation
page execute and read and write
3BF8000
trusted library allocation
page read and write
396D000
trusted library allocation
page read and write
37DF000
trusted library allocation
page read and write
2CE8000
trusted library allocation
page read and write
6660000
trusted library allocation
page execute and read and write
2C33000
trusted library allocation
page read and write
5F0000
heap
page read and write
4C50000
heap
page read and write
CB2000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
271E000
stack
page read and write
3BD8000
trusted library allocation
page read and write
38BB000
trusted library allocation
page read and write
6582000
trusted library allocation
page read and write
736F000
heap
page read and write
3A6F000
trusted library allocation
page read and write
38E3000
trusted library allocation
page read and write
3A57000
trusted library allocation
page read and write
7346000
heap
page read and write
F65000
trusted library allocation
page execute and read and write
29C2000
trusted library allocation
page read and write
7EEE000
stack
page read and write
3994000
trusted library allocation
page read and write
39A5000
trusted library allocation
page read and write
7646000
trusted library allocation
page read and write
5E2F000
stack
page read and write
3833000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
4C8B000
trusted library allocation
page read and write
B1E000
stack
page read and write
FC0000
heap
page read and write
6630000
trusted library allocation
page read and write
5B6E000
stack
page read and write
776E000
stack
page read and write
734B000
heap
page read and write
62E0000
heap
page read and write
2A37000
trusted library allocation
page read and write
9F8000
heap
page read and write
39B5000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
61AE000
stack
page read and write
51CE000
stack
page read and write
4CAD000
trusted library allocation
page read and write
53A0000
heap
page read and write
3959000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
6576000
trusted library allocation
page read and write
4C84000
trusted library allocation
page read and write
6830000
trusted library allocation
page execute and read and write
739E000
heap
page read and write
38B9000
trusted library allocation
page read and write
6372000
heap
page read and write
73F0000
heap
page read and write
29A5000
trusted library allocation
page read and write
AB1000
heap
page read and write
7640000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
6ADC000
stack
page read and write
3BCB000
trusted library allocation
page read and write
382E000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
3C59000
trusted library allocation
page read and write
38AC000
trusted library allocation
page read and write
39C3000
trusted library allocation
page read and write
7AEE000
stack
page read and write
6820000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
652A000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
480C000
stack
page read and write
65F0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
3966000
trusted library allocation
page read and write
3829000
trusted library allocation
page read and write
3BAC000
trusted library allocation
page read and write
A07000
heap
page read and write
7668000
trusted library allocation
page read and write
72F0000
trusted library allocation
page execute and read and write
2A13000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
6327000
heap
page read and write
53B0000
trusted library allocation
page execute and read and write
6B10000
trusted library allocation
page read and write
7387000
heap
page read and write
3A73000
trusted library allocation
page read and write
3860000
trusted library allocation
page read and write
599B000
heap
page read and write
7DEE000
stack
page read and write
CB6000
trusted library allocation
page execute and read and write
There are 374 hidden memdumps, click here to show them.